


default search action
6th POST 2017: Uppsala, Sweden (Part of ETAPS 2017)
- Matteo Maffei, Mark Ryan:
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science 10204, Springer 2017, ISBN 978-3-662-54454-9 - Willard Rafnsson, Limin Jia
, Lujo Bauer
:
Timing-Sensitive Noninterference through Composition. 3-25 - Mário S. Alvim
, Piotr Mardziel, Michael W. Hicks
:
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. 26-48 - Daniel Hedin, Alexander Sjösten
, Frank Piessens, Andrei Sabelfeld:
A Principled Approach to Tracking Information Flow in the Presence of Libraries. 49-70 - Patrick Ah-Fat, Michael Huth:
Secure Multi-party Computation: Information Flow of Outputs and Game Theory. 71-92
Security Protocols
- Sergiu Bursuc, Christian Johansen
, Shiwei Xu:
Automated Verification of Dynamic Root of Trust Protocols. 95-116 - Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse
:
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. 117-140 - Kushal Babel, Vincent Cheval, Steve Kremer:
On Communication Models When Verifying Equivalence Properties. 141-163 - Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
:
A Survey of Attacks on Ethereum Smart Contracts (SoK). 164-186
Security Policies
- Pablo Cañones, Boris Köpf, Jan Reineke:
Security Analysis of Cache Replacement Policies. 189-209 - Zaruhi Aslanyan, Flemming Nielson
:
Model Checking Exact Cost for Attack Scenarios. 210-231 - Marcos Cramer, Giovanni Casini
:
Postulates for Revocation Schemes. 232-252 - Ridha Khédri, Owain Jones, Mohammed Alabbad:
Defense in Depth Formulation and Usage in Dynamic Access Control. 253-274
Information Leakage
- Arthur Blot, Masaki Yamamoto, Tachio Terauchi
:
Compositional Synthesis of Leakage Resilient Programs. 277-297 - Martin Pettai, Peeter Laud:
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. 298-319

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.